0%

21-letter words containing c, i, t, y, o, u

  • acceptable use policy — (networking)   (AUP) Rules applied by many transit networks which restrict the use to which the network may be put. A well known example is NSFNet which does not allow commercial use. Enforcement of AUPs varies with the network.
  • administrative county — a principal administrative division in Great Britain, usually not coextensive with traditional county boundaries.
  • analytic continuation — a method of finding a function that coincides with a given analytic function in a domain and that remains analytic in a larger domain.
  • automatic hyphenation — (text)   A feature of some word processors which can insert hyphens into words which would otherwise extend beyond the right hand margin of the page. More advanced word processors may have options to control the position of the hyphen, to restrict certain words from being hyphenated, and to allow custom dictionaries of hyphenation points to be built up.
  • axiom of countability — the property satisfied by a topological space in which the neighborhood system of each point has a base consisting of a countable number of neighborhoods (first axiom of countability) or the property satisfied by a topological space that has a base for its topology consisting of a countable number of subsets of the space (second axiom of countability)
  • baudouin de courtenay — Jan Ignacy Niecisław [yahn ig-nah-tsi nye-tsis-lahf] /yɑn ɪgˈnɑ tsɪ ˈnyɛ tsɪsˌlɑf/ (Show IPA), 1845–1929, Polish linguist: pioneer in modern phonology.
  • bibliographic utility — an organization that maintains computerized bibliographic records and offers to its members or customers various products and services related to these records.
  • butterfly common lisp — A parallel version of Common LISP for the BBN Butterfly computer.
  • certificate authority — (cryptography, body)   (CA or "Trusted Third Party") An entity (typically a company) that issues digital certificates to other entities (organisations or individuals) to allow them to prove their identity to others. A Certificate Authority might be an external company such as VeriSign that offers digital certificate services or they might be an internal organisation such as a corporate MIS department. The Certificate Authority's chief function is to verify the identity of entities and issue digital certificates attesting to that identity. The process uses public key cryptography to create a "network of trust". If I want to prove my identity to you, I ask a CA (who you trust to have verified my identity) to encrypt a hash of my signed key with their private key. Then you can use the CA's public key to decrypt the hash and compare it with a hash you calculate yourself. Hashes are used to decrease the amount of data that needs to be transmitted. The hash function must be cryptographically strong, e.g. MD5.
  • clayton antitrust act — an act of Congress in 1914 supplementing the Sherman Antitrust Act and establishing the FTC.
  • coinfectious immunity — premunition.
  • comfortably-furnished — containing comfortable furniture
  • community association — (in Britain) an organization of people and groups working for the common good of a neighbourhood, usually operating under a written constitution registered with the Charity Commissioners
  • conductivity improver — A conductivity improver is a substance used to get rid of static electrical charge in fuel, and improve the flow of the fuel.
  • construction industry — a branch of commercial enterprise concerned with the construction of buildings, bridges, etc
  • consummatory behavior — a behavior pattern that occurs in response to a stimulus and that achieves the satisfaction of a specific drive, as the eating of captured prey by a hungry predator (distinguished from appetitive behavior).
  • continuous stationery — paper that is perforated between pages and folded concertina fashion, used in dot-matrix, line, and daisywheel printers
  • cottony-cushion scale — a small scale insect, Icerya purchasi, that is a pest of citrus trees in California: it is controlled by introducing an Australian ladybird, Rodolia cardinalis, into affected areas
  • counter-revolutionary — Counter-revolutionary activities are activities intended to reverse the effects of a previous revolution.
  • crude oil dehydration — Crude oil dehydration is the removal of water or water vapor from crude oil, by separating the oil from the water, often in a rotating centrifuge.
  • cyclical unemployment — unemployment caused by fluctuations in the level of economic activity inherent in trade cycles
  • discretionary account — an account in which the stockbroker is allowed complete control over the purchase and sale of securities on the customer's behalf.
  • disruptive technology — A disruptive technology is a new technology, such as computers and the Internet, which has a rapid and major effect on technologies that existed before.
  • educational sociology — the application of sociological principles and methods to the solution of problems in an educational system.
  • employee contribution — money contributed by an employee to his or her employer's pension fund
  • employer contribution — money contributed by an employer to his or her employee's pension fund
  • faculty board meeting — a meeting of the governing body of a faculty
  • functional dependency — (database)   Given a relation R (in a relational database), attribute Y of R is functionally dependent on attribute X of R and X of R functionally determines Y of R (in symbols R.X -> R.Y) if and only if each X in R has associated with it precisely one Y in R (at any one time). Attributes X and Y may be composite. This is very close to a function in the mathematical sense.
  • homogeneous catalysis — Homogeneous catalysis is catalysis in which the catalyst takes part in the reaction that it increases.
  • humanistic psychology — an approach to psychology that emphasizes emotions and the better understanding of the self in terms of observation of oneself and one's relations with others
  • hydraulic accumulator — an apparatus in which gas, usually air, is used as a cushion or shock absorber in a hydraulic system.
  • hypothetico-deductive — pertaining to or governed by the supposed method of scientific progress whereby a general hypothesis is tested by deducing predictions that may be experimentally tested. When such a prediction is falsified the theory is rejected and a new hypothesis is required
  • ieee computer society — (body)   The society of the IEEE which publishes the journal "Computer".
  • immunohistochemically — By means of or in regard to immunohistochemistry.
  • induced radioactivity — artificial radioactivity.
  • induction loop system — a system enabling partially deaf people to hear dialogue and sound in theatres, cinemas, etc, consisting of a loop of wire placed round the perimeter of a designated area. This emits an electromagnetic signal which is picked up by a hearing aid
  • industrial psychology — the application of psychological principles and techniques to business and industrial problems, as in the selection of personnel or development of training programs.
  • insulin shock therapy — a former treatment for mental illness, especially schizophrenia, employing insulin-induced hypoglycemia as a method for producing convulsive seizures.
  • intellectual property — Law. property that results from original creative thought, as patents, copyright material, and trademarks.
  • intentional community — a community designed and planned around a social ideal or collective values and interests, often involving shared resources and responsibilities.
  • linguistic philosophy — an approach to philosophical problems used especially by certain British and American philosophers, inspired by G. E. Moore, and marked by the elucidation of difficult and controversial concepts by resolving them into their elements.
  • magnetofluid dynamics — magnetohydrodynamics.
  • manufacturing company — a company that manufactures goods
  • modulus of elasticity — the ratio of the stress applied to a body or substance to the resulting strain within the elastic limit
  • multilayer perceptron — A network composed of more than one layer of neurons, with some or all of the outputs of each layer connected to one or more of the inputs of another layer. The first layer is called the input layer, the last one is the output layer, and in between there may be one or more hidden layers.
  • muon-catalysed fusion — an experimental form of nuclear fusion in which hydrogen and deuterium muonic atoms are formed. Because the mass of the muon is much larger than that of the electron, the atoms are smaller, and the nuclei are close enough for fusion to occur
  • nitrosylsulfuric acid — a clear, straw-colored, oily, corrosive liquid, HNO 5 S, used chiefly in the manufacture of dyes.
  • one-way hash function — (algorithm)   (Or "message digest function") A one-way function which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash.
  • potassium thiocyanate — a colorless, crystalline, hygroscopic, water-soluble solid, KSCN, used chiefly in the manufacture of chemicals, dyes, and drugs.
  • public-key encryption — (cryptography)   (PKE, Or "public-key cryptography") An encryption scheme, introduced by Diffie and Hellman in 1976, where each person gets a pair of keys, called the public key and the private key. Each person's public key is published while the private key is kept secret. Messages are encrypted using the intended recipient's public key and can only be decrypted using his private key. This is often used in conjunction with a digital signature. The need for sender and receiver to share secret information (keys) via some secure channel is eliminated: all communications involve only public keys, and no private key is ever transmitted or shared. Public-key encryption can be used for authentication, confidentiality, integrity and non-repudiation. See also knapsack problem.

On this page, we collect all 21-letter words with C-I-T-Y-O-U. It’s easy to find right word with a certain length. It is the easiest way to find 21-letter word that contains in C-I-T-Y-O-U to use in Scrabble or Crossword puzzles

Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?